共查询到20条相似文献,搜索用时 15 毫秒
1.
部署是软件生命周期中的一个重要环节,是软件生产的后期活动,通过配置、安装和激活等活动来保障软件制品的后续运行.为了系统地了解软件部署的现状和最新进展,建立了一个多侧面、细粒度的分析框架——W4H,以对该领域的主要研究工作和系统工具进行概括分析.该框架从软件部署的概念和面对的问题空间出发,由5个侧面,12个维度构成,覆盖了软件部署方法中主体、客体、适用范围、方式策略和过程支持能力等多个方面.基于W4H分析框架,对当前具有代表性的软件部署方法与技术进行分析和总结.案例研究结果表明,该分析框架能够对软件部署方法与技术进行较为全面的分析,对软件系统部署方法和技术的选择及开发具有重要的指导意义. 相似文献
2.
文章研究了MANET中多径特性对QoS路径可靠性的影响,针对多跳路径的可靠性计算问题,提出了一种分析构架。几个考虑的主要参数有平均链路簇,多径数目,路径复杂度和跳数差别因子。方案具有一定的普遍适用性,在给定的源和目的节点中,对于单路径和多径的情况都能较好运用。 相似文献
3.
基于LDAP的框架及其实现 总被引:2,自引:0,他引:2
目录服务以其支持分布式环境、安全可靠、灵活方便等优势正从提供用户信息查找、黄页服务等走向网络管理的舞台,并逐渐成为下一代智能化网络管理的核心部分。轻型目录访问协议(LDAP)能够使用一种类似于X.500协议中数据的组织方式来访问目录中的信息,并且它得到了IBM,Tivoli,Novell,Sun,Microsoft等许多厂商的支持。由于LDAP在已有系统中其适应性和兼容性等方面的优势,使得它越来越受到人们的关注。 相似文献
4.
基于LDAP的框架及其实现 总被引:4,自引:0,他引:4
目录服务以其支持分布式环境、安全可靠、灵活方便等优势正从提供用户信息查找、黄页服务等走向网络管理的舞台,并逐渐成为下一代智能化网络管理的核心部分。轻型目录访问协议(LDAP)能够使用一种类似于X.500协议中数据的组织方式来访问目录中的信息,并且它得到了IBM,Tivoli,Novell,Sun,Microsoft等许多厂商的支持。由于LDAP在已有系统中其适应性和兼容性等方面的优势,使得它越来越受到人们的关注。 相似文献
5.
《Information & Communications Technology Law》2008,17(1):3-23
Blogs are permeating most niches of social life, and addressing a wide range of topics from scholarly and political issues1 to family and children's daily lives. By their very nature, blogs raise a number of privacy issues as they are easy to produce and disseminate, resulting in large amounts of sometimes personal information being broadcast across the Internet in a persistent and cumulative manner. This article reports the preliminary findings of an online survey of bloggers from around the world. The survey explored bloggers' subjective sense of privacy by examining their blogging practices and their expectations of privacy when publishing online. The findings suggest that blogging offers individuals a unique opportunity to work on their self-identity via the degree of self-expression and social interaction that is available in this medium. This finding helps to explain why bloggers consciously bring the 'private' to the public realm, despite the inherent privacy risks they face in doing so. 相似文献
6.
《中国信息技术教育》2005,(11)
作为一个信息时代的教师,很需要有一个能更广泛地与人交流分享思想的平台,使自己能常学常思常做常新.在仔细推敲了Blog的特征与可能的功用后,我于2004年2月开始了Blog的旅程. 相似文献
7.
This article asks whether blogging in the United Kingdom, which started later than in the United States, reproduces the gender differences in blogging behavior and the gender inequalities in recognition that have been observed in studies based largely on U.S. bloggers. A sample of 48 female and male British bloggers answered a questionnaire about their blogging practices and attitudes; data were also collected from their blogs and by means of online tools. For both sexes, blogging is mainly a leisure activity, and men and women find the same range of satisfactions in blogging. However, more women use blogging as an outlet for creative work, whether as a hobby or as a livelihood. The results support several reasons advanced in previous research for the lower public profile of women bloggers. 相似文献
8.
9.
Agile Requirements Engineering Practices: An Empirical Study 总被引:4,自引:0,他引:4
An analysis of data from 16 software development organizations reveals seven agile RE practices, along with their benefits and challenges. The rapidly changing business environment in which most organizations operate is challenging traditional requirements-engineering (RE) approaches. Software development organizations often must deal with requirements that tend to evolve quickly and become obsolete even before project completion. Rapid changes in competitive threats, stakeholder preferences, development technology, and time-to-market pressures make prespecified requirements inappropriate. 相似文献
10.
统一协作模型及协作应用间的互操作问题是CSCW研发和应用工作中急待解决的问题,文章从统一协作模型分析入手,提出了一种面向协作应用的统一协作框架(UCF),从通讯参考模型、协议栈和协作消息结构三方面分析了UCF应用体系结构,最后结合XML和J2EE技术具体讨论了UCF的实现机制。 相似文献
11.
Gaonkar R. S. Viswanadham N. 《Automation Science and Engineering, IEEE Transactions on》2007,4(2):265-273
In this paper, we develop a framework to classify supply chain risk-management problems and approaches for the solution of these problems. We argue that risk-management problems need to be handled at three levels: 1) strategic, 2) operational, and 3) tactical. In addition, risk within the supply chain might manifest itself in the form of deviations, disruptions, and disasters. To handle unforeseen events in the supply chain, there are two obvious approaches: 1) to design chains with built-in risk tolerance and 2) to contain the damage once the undesirable event has occurred. Both of these approaches require a clear understanding of undesirable events that may take place in the supply chain and the associated consequences and impacts from these events. Having described these approaches, we then focus our efforts on mapping out the propagation of events in the supply chain due to supplier nonperformance, and employ our insight to develop two mathematical programming-based preventive models for strategic level deviation and disruption management. The first model, a simple integer quadratic optimization model, adapted from the Markowitz model, determines optimal partner selection with the objective of minimizing both the operational cost and the variability of total operational cost. The second model, a simple mixed integer programming optimization model, adapted from the credit risk minimization model, determines optimal partner selection such that the supply shortfall is minimized even in the face of supplier disruptions. Hence, both of these models offer possible approaches to robust supply chain design 相似文献
12.
Spam, also known as unsolicited bulk e-mail (UBE), has recently become a serious threat that negatively impacts the usability of legitimate mails. In this article, an evidential spam-filtering framework is proposed. As a useful tool to handle uncertainty, the Dempster–Shafer theory of evidence (D–S theory) is integrated into the proposed approach. Five representative features from an e-mail header are analyzed. With a machine-learning algorithm, e-mail headers with known classifications are used to train the framework. When using the framework for a given e-mail header, its representative features are quantified. Although in classical probability theory, possibilities are forcedly assigned even when information is not adequate, in our approach, for every word in an e-mail subject, basic probability assignments (BPA) are assigned in a more flexible way, thus providing a more reasonable result. Finally, BPAs are combined and transformed into pignistic probabilities for decision-making. Empirical trials on real-world datasets show the efficiency of the proposed framework. 相似文献
13.
Reconfigurable supercomputer architectures require new programming tools that support application portability. The Vforce framework, based on the object-oriented VSIPL++ standard, encapsulates hardware-specific implementations behind a standard API, thus insulating application-level code from hardware-specific details 相似文献
14.
We develop an analytical framework to investigate the impacts of network dynamics on the user perceived video quality. Our investigation stands from the end user's perspective by analyzing the receiver playout buffer. In specific, we model the playback buffer at the receiver by a G/G/1/? and G/G/1/N queue, respectively, with arbitrary patterns of packet arrival and playback. We then examine the transient queue length of the buffer using the diffusion approximation. We obtain the closed-form expressions of the video quality in terms of the start-up delay, fluency of video playback and packet loss, and represent them by the network statistics, i.e., the average network throughput and delay jitter. Based on the analytical framework, we propose adaptive playout buffer management schemes to optimally manage the threshold of video playback towards the maximal user utility, according to different quality-of-service requirements of end users. The proposed framework is validated by extensive simulations. 相似文献
15.
OKMF: 一个基于本体论的知识管理系统框架 总被引:12,自引:1,他引:12
根据知识管理的工作原理、功能结构和知识在企事业中的全过程,提出将知识过程分为俘获、保存和重用三个阶段,用知识的转化和连接机制衔接这三个环节,本体论贯穿始终.设计了一个此理论下的基于本体论的知识管理系统基本框架——OKMF,对于将本体翻译为元知识结构、基于本体论的知识项检索以及人与知识的连接机制等方面,进行了比较系统和深入的论述,探讨了框架中的主要技术并给出了一个系统实例。 相似文献
16.
Eric P. S. Baumer Mark Sueyoshi Bill Tomlinson 《Computer Supported Cooperative Work (CSCW)》2011,20(1-2):1-36
A significant amount of research has focused on blogs, bloggers, and blogging. However, relatively little work has examined blog readers, their interactions with bloggers, or their impact on blogging. This paper presents a qualitative study focusing specifically on readers of political blogs to develop a better understanding of readers?? interactions with blogs and bloggers. This is the first such study to examine the same blogging activity from both readers?? and bloggers?? perspectives. Readers?? significance and contributions to blogs are examined through a number of themes, including: community membership and participation; the relationship between political ideology, reading habits, and political participation; and differences and similarities between mainstream media (MSM) and blogs. Based on these analyses, this paper argues that blogging is not only a social activity, but is a collaborative process of co-creation in which both bloggers and readers engage. Implications of this finding contribute to the study and understanding of reader participation, to the design of technologies for bloggers and blog readers, and to the development of theoretical understandings of social media. 相似文献
17.
Kateryna Kuksenok Cecilia Aragon James Fogarty Charlotte P. Lee Gina Neff 《Computer Supported Cooperative Work (CSCW)》2017,26(4-6):663-691
Computing affects how scientific knowledge is constructed, verified, and validated. Rapid changes in hardware capability, and software flexibility, are coupled with a volatile tool and skill set, particularly in the interdisciplinary scientific contexts of oceanography. Existing research considers the role of scientists as both users and producers of code. We focus on how an intentional, individually-initiated but socially-situated, process of uptake influences code written by scientists. We present an 18-month interview and observation study of four oceanography teams, with a focus on ethnographic shadowing of individuals undertaking code work. Through qualitative analysis, we developed a framework of deliberate individual change, which builds upon prior work on programming practices in science through the lens of sociotechnical infrastructures. We use qualitative vignettes to illustrate how our theoretical framework helps to understand changing programming practices. Our findings suggest that scientists use and produce software in a way that deliberately mitigates the potential pitfalls of their programming practice. In particular, the object and method of visualization is subject to restraint intended to prevent accidental misuse. 相似文献
18.
Francesc Lordan Enric Tejedor Jorge Ejarque Roger Rafanell Javier Álvarez Fabrizio Marozzo Daniele Lezzi Raül Sirvent Domenico Talia Rosa M. Badia 《Journal of Grid Computing》2014,12(1):67-91
The rise of virtualized and distributed infrastructures has led to new challenges to accomplish the effective use of compute resources through the design and orchestration of distributed applications. As legacy, monolithic applications are replaced with service-oriented applications, questions arise about the steps to be taken in order to maximize the usefulness of the infrastructures and to provide users with tools for the development and execution of distributed applications. One of the issues to be solved is the existence of multiple cloud solutions that are not interoperable, which forces the user to be locked to a specific provider or to continuously adapt applications. With the objective of simplifying the programmers challenges, ServiceSs provides a straightforward programming model and an execution framework that helps on abstracting applications from the actual execution environment. This paper presents how ServiceSs transparently interoperates with multiple providers implementing the appropriate interfaces to execute scientific applications on federated clouds. 相似文献
19.
Yustus Eko Oktian Sang-Gon Lee JunHuy Lam 《Journal of Network and Systems Management》2018,26(1):147-168
Implementing REST API for SDN is quite challenging compared to conventional web services. First, the state transfers in SDN are more complex among network devices, controllers, and applications. Second, SDN provides more granular resources in both the controller and the network device itself. Those challenges require SDN to have a proper REST API security definition, which is currently not available in most of the SDN controllers. In this paper, we propose and implement a REST API security module for SDN controller based on OAuth 2.0. We answer the SDN REST API security challenges by presenting novel access control parameters to cope with the granular resources introduced by SDN. Our prototype maintains the best trade-off between performance and safety by generating a maximum value of 15% overhead during our benchmark. It also offers a customizable and flexible access control for the network in various use cases. 相似文献
20.
DynamiCS: An Actor-Based Framework for Negotiating Mobile Agents 总被引:2,自引:0,他引:2
In this article, a framework to integrate negotiation capabilities—particularly, components implementing a negotiation strategy—into mobile agents is described. This approach is conceptually based on the notion of an actor system which decomposes an application component into autonomously executing subcomponents cooperating with each other. Technically, the framework is based on a plug-in mechanism enabling a dynamic composition of negotiating agents. Additionally, this contribution describes how interaction-oriented rule mechanisms can be deployed to control the behavior of strategy actors. 相似文献